SecurityAwarenessTrainingIncidentResponseData LossPrevention(DLP)SecureSocketLayer(SSL)SecurityPatchAccessControlIntrusionDetectionSystem(IDS)EndpointSecurityDigitalFootprintSecurityIncidentSecurityPolicyPhishingAwarenessPatchManagementRansomwarePenetrationTestingTwo-FactorAuthentication(2FA)SecurityAuditNetworkMonitoringAuthenticationPasswordStrengthPhishingCyberThreatSecurityBreachResponseBiometricAuthenticationSecurityBestPracticesCyberHygieneSecurityAwarenessMonthSocialEngineeringMalwareFirewallIntrusionPreventionSystem(IPS)Zero-DayExploitDataBreachVulnerabilityMulti-FactorAuthentication(MFA)NetworkSecurityFirewallConfigurationInformationSecurityEncryptionDenial ofService(DoS)SecurityAwarenessTrainingIncidentResponseData LossPrevention(DLP)SecureSocketLayer(SSL)SecurityPatchAccessControlIntrusionDetectionSystem(IDS)EndpointSecurityDigitalFootprintSecurityIncidentSecurityPolicyPhishingAwarenessPatchManagementRansomwarePenetrationTestingTwo-FactorAuthentication(2FA)SecurityAuditNetworkMonitoringAuthenticationPasswordStrengthPhishingCyberThreatSecurityBreachResponseBiometricAuthenticationSecurityBestPracticesCyberHygieneSecurityAwarenessMonthSocialEngineeringMalwareFirewallIntrusionPreventionSystem(IPS)Zero-DayExploitDataBreachVulnerabilityMulti-FactorAuthentication(MFA)NetworkSecurityFirewallConfigurationInformationSecurityEncryptionDenial ofService(DoS)

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Security Awareness Training
  2. Incident Response
  3. Data Loss Prevention (DLP)
  4. Secure Socket Layer (SSL)
  5. Security Patch
  6. Access Control
  7. Intrusion Detection System (IDS)
  8. Endpoint Security
  9. Digital Footprint
  10. Security Incident
  11. Security Policy
  12. Phishing Awareness
  13. Patch Management
  14. Ransomware
  15. Penetration Testing
  16. Two-Factor Authentication (2FA)
  17. Security Audit
  18. Network Monitoring
  19. Authentication
  20. Password Strength
  21. Phishing
  22. Cyber Threat
  23. Security Breach Response
  24. Biometric Authentication
  25. Security Best Practices
  26. Cyber Hygiene
  27. Security Awareness Month
  28. Social Engineering
  29. Malware
  30. Firewall
  31. Intrusion Prevention System (IPS)
  32. Zero-Day Exploit
  33. Data Breach
  34. Vulnerability
  35. Multi-Factor Authentication (MFA)
  36. Network Security
  37. Firewall Configuration
  38. Information Security
  39. Encryption
  40. Denial of Service (DoS)